Results

By type

          2022-06-12 05:15:05,532 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-06-12 05:15:06,909 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-06-12 05:15:07.772  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jun 12, 2022 5:15:10 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jun 12, 2022 5:15:10 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jun 12, 2022 5:15:10 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jun 12, 2022 5:15:10 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-06-12 05:15:11.212 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-06-12 05:15:11.583  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-06-12 05:15:11.782  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-06-12 05:15:12.778 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-06-12 05:15:12.783 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-06-12 05:15:12.785 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-06-12 05:15:12.790 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-06-12 05:15:12.837 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
2022-06-12 05:15:12.844 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-06-12 05:15:12.985 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-06-12 05:15:13.806 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jun 12, 2022 5:15:14 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-06-12 05:15:15.053  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 10.782 seconds (JVM running for 12.828)
Jun 12, 2022 5:15:37 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-06-12 05:16:06.022  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-12 05:16:06.035 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-12 05:16:06.090 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-12 05:16:06.097 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-12 05:16:06.121  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-12 05:16:06.125  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-12 05:16:06.126  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-12 05:16:06.127 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-12 05:16:06.128 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-12 05:16:06.133 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-12 05:16:06.141 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-12 05:16:06.145 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-12 05:16:06.190 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-12 05:16:06.197 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-12 05:16:06.198 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-12 05:16:06.204 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-12 05:16:06.860  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-12 05:16:06.863  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-12 05:16:06.864 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-12 05:16:06.866 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-12 05:16:06.876  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-12 05:16:06.878  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-12 05:16:06.879 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 05:16:06.879 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 05:16:06.880 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 05:16:06.894 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 05:16:06.895 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 05:16:06.895 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 05:16:06.903 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 05:16:06.904 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 05:16:06.904 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 05:16:06.906 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-12 05:16:06.938 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 373415076224392227462997143177459335079962776374
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 12 05:12:18 UTC 2022
           Final Date: Fri Jun 11 05:12:17 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9a:06:ff:1d:17:ac:0f:b1:e0:6f:b2:01:1f:20:a2:db:ec:30:ed:9e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 756737166bc7d936a7aeaf13eb3d78cf0aa2e985
                       26b394e804548ef157f0ec04366536ec6209cb78
                       d2e523984aaa9c2a366a8229804bab0639822585
                       ad7fdfb781945c7b8ed3124c096e5e48f07aed42
                       0a968910234beac76d7db48905b1c1f5c55fb5dd
                       2f1155b6409eb7bda94e34bfb67cd7554d9c6cdc
                       207bf8b1bc08423f898f363ec583ca2a27fa413b
                       ddd64473986f310f2a37c1fb6ce5b854d53f0e69
                       c99a1412a510b6c7ba6f50927164ea367d990cff
                       6171fc6a8795d0dc1f045eb30a32f9781d12e7bb
                       93980ef01c10a2d459ecb2795e743e7e1b9f2c80
                       fe0a8cdcb002ce4e952b891a293c01ae67f82c5f
                       38b83a5c559e372c21fb7cd60f301aa7f8ac0f83
                       0d9c6a72f26a6c6df396d14619fce77313a5199e
                       311b4cc07ff9bc099cced0ecb765871a26fdf3de
                       ff497f4734af8d7f7303c86b0e640778edff8f9c
                       b02b92d3039cb802cc17295b3b7516d1be354373
                       f15f2134c15595d35a19edbea73c698fbb6474ce
                       9eb9f52ef421f292079dbbcaa7b508cbdb04351c
                       8c735b73
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ad:f7:fe:1b:46:ab:37:29:28:c3:41:59:83:29:67:54:c1:7b:42:7a]
            modulus: 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
    public exponent: 10001

] 
2022-06-12 06:38:29.274  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-12 06:38:29.276 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-12 06:38:29.279 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-12 06:38:29.280 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-12 06:38:29.281  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-12 06:38:29.282  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-12 06:38:29.282  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-12 06:38:29.283 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-12 06:38:29.284 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-12 06:38:29.284 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-12 06:38:29.296 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-12 06:38:29.297 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-12 06:38:29.298 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-12 06:38:29.298 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-12 06:38:29.471  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-12 06:38:29.473  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-12 06:38:29.474 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-12 06:38:29.474 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-12 06:38:29.477  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-12 06:38:29.477  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-12 06:38:29.478 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 06:38:29.478 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 06:38:29.479 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 06:38:29.480 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 06:38:29.480 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 06:38:29.480 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 06:38:29.481 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 06:38:29.481 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 06:38:29.482 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 06:38:29.483 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-12 06:38:29.487 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 373415076224392227462997143177459335079962776374
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 12 05:12:18 UTC 2022
           Final Date: Fri Jun 11 05:12:17 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9a:06:ff:1d:17:ac:0f:b1:e0:6f:b2:01:1f:20:a2:db:ec:30:ed:9e]
            modulus: 89787f3a655267a2f2b796bf7fdb13cbe8cfbc8eb49add404a9376230fe0a531f5671a8c5e7d2cfcd70ac0b21ed94cca5c003a3e925e7800662a7eddd0fefbd84ba1956c37d4d99862ec8c543ef2fd2a80556870883319a0646ca127f858a7e698dd52d893c5b458011c936011c752359f937eb2282f98f31539e3875e4eb6fa5741fda553a3f387594f4283c4803890930c9a14722313b4e6b7621f0a1c07651e06b22d8c7aa753ca268b3450c2b172e67e68bbec33fa7498a8e06c16c250599414ddf65c24e71d35cfc54d0d9c332ea47d4d79ba230cb28bf99eb9336f8bf6068c58eb64865286076b6a0ceccdaef0f6a4e07ef93a552d6abef7570e067f6861eb96a865484aaa33f9bc8d5119aadb264348685483bfc09f338c3dee64da6ef176e4b2d281acd1ad1ee6747d09750bf4ff2ba9a7a0d3d3967af9e572e08bc6bdd1c5b501651abae81767222e260883d5f8a7eb0b31a2d1c51ce525d1b2ce221e714cf2b44b5f6964a256b798816569464dc16884f8c489e876f108cbb0c0cf
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 756737166bc7d936a7aeaf13eb3d78cf0aa2e985
                       26b394e804548ef157f0ec04366536ec6209cb78
                       d2e523984aaa9c2a366a8229804bab0639822585
                       ad7fdfb781945c7b8ed3124c096e5e48f07aed42
                       0a968910234beac76d7db48905b1c1f5c55fb5dd
                       2f1155b6409eb7bda94e34bfb67cd7554d9c6cdc
                       207bf8b1bc08423f898f363ec583ca2a27fa413b
                       ddd64473986f310f2a37c1fb6ce5b854d53f0e69
                       c99a1412a510b6c7ba6f50927164ea367d990cff
                       6171fc6a8795d0dc1f045eb30a32f9781d12e7bb
                       93980ef01c10a2d459ecb2795e743e7e1b9f2c80
                       fe0a8cdcb002ce4e952b891a293c01ae67f82c5f
                       38b83a5c559e372c21fb7cd60f301aa7f8ac0f83
                       0d9c6a72f26a6c6df396d14619fce77313a5199e
                       311b4cc07ff9bc099cced0ecb765871a26fdf3de
                       ff497f4734af8d7f7303c86b0e640778edff8f9c
                       b02b92d3039cb802cc17295b3b7516d1be354373
                       f15f2134c15595d35a19edbea73c698fbb6474ce
                       9eb9f52ef421f292079dbbcaa7b508cbdb04351c
                       8c735b73
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [99:c8:1a:e5:99:ca:55:73:83:0a:8d:1e:45:2e:84:90:59:e9:7c:f3]
            modulus: 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
    public exponent: 10001

] 
2022-06-12 06:40:18.599  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-12 06:40:18.602 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-12 06:40:18.604 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-12 06:40:18.605 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-12 06:40:18.606  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-12 06:40:18.607  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-12 06:40:18.608  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-12 06:40:18.609 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-12 06:40:18.610 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-12 06:40:18.611 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-12 06:40:18.618 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-12 06:40:18.620 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-12 06:40:18.620 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-12 06:40:18.621 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-12 06:40:18.786  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-12 06:40:18.787  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-12 06:40:18.787 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-12 06:40:18.788 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-12 06:40:18.792  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-12 06:40:18.793  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-12 06:40:18.794 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 06:40:18.794 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 06:40:18.795 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 06:40:18.796 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 06:40:18.796 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 06:40:18.797 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 06:40:18.798 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 06:40:18.798 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 06:40:18.798 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 06:40:18.800 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-12 06:40:18.807 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 373415076224392227462997143177459335079962776374
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 12 05:12:18 UTC 2022
           Final Date: Fri Jun 11 05:12:17 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9a:06:ff:1d:17:ac:0f:b1:e0:6f:b2:01:1f:20:a2:db:ec:30:ed:9e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 756737166bc7d936a7aeaf13eb3d78cf0aa2e985
                       26b394e804548ef157f0ec04366536ec6209cb78
                       d2e523984aaa9c2a366a8229804bab0639822585
                       ad7fdfb781945c7b8ed3124c096e5e48f07aed42
                       0a968910234beac76d7db48905b1c1f5c55fb5dd
                       2f1155b6409eb7bda94e34bfb67cd7554d9c6cdc
                       207bf8b1bc08423f898f363ec583ca2a27fa413b
                       ddd64473986f310f2a37c1fb6ce5b854d53f0e69
                       c99a1412a510b6c7ba6f50927164ea367d990cff
                       6171fc6a8795d0dc1f045eb30a32f9781d12e7bb
                       93980ef01c10a2d459ecb2795e743e7e1b9f2c80
                       fe0a8cdcb002ce4e952b891a293c01ae67f82c5f
                       38b83a5c559e372c21fb7cd60f301aa7f8ac0f83
                       0d9c6a72f26a6c6df396d14619fce77313a5199e
                       311b4cc07ff9bc099cced0ecb765871a26fdf3de
                       ff497f4734af8d7f7303c86b0e640778edff8f9c
                       b02b92d3039cb802cc17295b3b7516d1be354373
                       f15f2134c15595d35a19edbea73c698fbb6474ce
                       9eb9f52ef421f292079dbbcaa7b508cbdb04351c
                       8c735b73
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [49:15:f1:9a:0a:bd:4c:ba:fb:7e:8d:30:69:d7:67:bb:91:2f:80:f9]
            modulus: c38d487d9448a113243edf8dda76ff2d99222b67f224d9d4d397a765abc6bcdcc25fffdfb2df0401e29e2f3c564faf46e089c2180bf06756dc14074cab60b52952f5bdfb0a387a032080482dbf2b2586e631acd35e356208af5c7b7e98fd016277483ce4b0a235143264dd3ae4a86b200dac379bffee390dda5b1d0c729204f9d2d3e262db4c5eb49c7f3766a60f95be64021dbb9e43b8138b84e8165d13151c7b3db73130c999c131b39faaff8f320051fd1120c7287931bf688f1374d781fefe42b15669f930824181f95e895f3f1d8dd7cb2496952a20b2f4cc4122915e839603866c05118f2bf183e765be71528a1f8139017962ceaabf277984db565fdb
    public exponent: 10001

] 
2022-06-12 06:41:35.495  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-12 06:41:35.497 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-12 06:41:35.498 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-12 06:41:35.499 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-12 06:41:35.500  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-12 06:41:35.501  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-12 06:41:35.502  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-12 06:41:35.502 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-12 06:41:35.502 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-12 06:41:35.503 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-12 06:41:35.525 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-12 06:41:35.526 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-12 06:41:35.526 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-12 06:41:35.526 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-12 06:41:35.645  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-12 06:41:35.646  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-12 06:41:35.647 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-12 06:41:35.647 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-12 06:41:35.650  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-12 06:41:35.650  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-12 06:41:35.651 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 06:41:35.651 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 06:41:35.652 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 06:41:35.653 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 06:41:35.653 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 06:41:35.654 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 06:41:35.655 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 06:41:35.655 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 06:41:35.656 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 06:41:35.657 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-12 06:41:35.661 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 373415076224392227462997143177459335079962776374
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 12 05:12:18 UTC 2022
           Final Date: Fri Jun 11 05:12:17 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9a:06:ff:1d:17:ac:0f:b1:e0:6f:b2:01:1f:20:a2:db:ec:30:ed:9e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 756737166bc7d936a7aeaf13eb3d78cf0aa2e985
                       26b394e804548ef157f0ec04366536ec6209cb78
                       d2e523984aaa9c2a366a8229804bab0639822585
                       ad7fdfb781945c7b8ed3124c096e5e48f07aed42
                       0a968910234beac76d7db48905b1c1f5c55fb5dd
                       2f1155b6409eb7bda94e34bfb67cd7554d9c6cdc
                       207bf8b1bc08423f898f363ec583ca2a27fa413b
                       ddd64473986f310f2a37c1fb6ce5b854d53f0e69
                       c99a1412a510b6c7ba6f50927164ea367d990cff
                       6171fc6a8795d0dc1f045eb30a32f9781d12e7bb
                       93980ef01c10a2d459ecb2795e743e7e1b9f2c80
                       fe0a8cdcb002ce4e952b891a293c01ae67f82c5f
                       38b83a5c559e372c21fb7cd60f301aa7f8ac0f83
                       0d9c6a72f26a6c6df396d14619fce77313a5199e
                       311b4cc07ff9bc099cced0ecb765871a26fdf3de
                       ff497f4734af8d7f7303c86b0e640778edff8f9c
                       b02b92d3039cb802cc17295b3b7516d1be354373
                       f15f2134c15595d35a19edbea73c698fbb6474ce
                       9eb9f52ef421f292079dbbcaa7b508cbdb04351c
                       8c735b73
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [28:bf:6a:8d:47:ef:bd:eb:49:15:eb:6b:4e:ca:73:69:d1:91:a5:e1]
            modulus: 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
    public exponent: 10001

] 
2022-06-12 06:43:45.985  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-12 06:43:45.987 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-12 06:43:45.989 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-12 06:43:45.990 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-12 06:43:45.990  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-12 06:43:45.991  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-12 06:43:45.998  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-12 06:43:45.998 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-12 06:43:45.999 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-12 06:43:45.999 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-12 06:43:46.006 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-12 06:43:46.007 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-12 06:43:46.008 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-12 06:43:46.008 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-12 06:43:46.157  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-12 06:43:46.158  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-12 06:43:46.159 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-12 06:43:46.159 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-12 06:43:46.161  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-12 06:43:46.162  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-12 06:43:46.163 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 06:43:46.163 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 06:43:46.163 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 06:43:46.164 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 06:43:46.165 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 06:43:46.165 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 06:43:46.166 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 06:43:46.167 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 06:43:46.167 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 06:43:46.168 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-12 06:43:46.182 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 373415076224392227462997143177459335079962776374
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 12 05:12:18 UTC 2022
           Final Date: Fri Jun 11 05:12:17 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9a:06:ff:1d:17:ac:0f:b1:e0:6f:b2:01:1f:20:a2:db:ec:30:ed:9e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 756737166bc7d936a7aeaf13eb3d78cf0aa2e985
                       26b394e804548ef157f0ec04366536ec6209cb78
                       d2e523984aaa9c2a366a8229804bab0639822585
                       ad7fdfb781945c7b8ed3124c096e5e48f07aed42
                       0a968910234beac76d7db48905b1c1f5c55fb5dd
                       2f1155b6409eb7bda94e34bfb67cd7554d9c6cdc
                       207bf8b1bc08423f898f363ec583ca2a27fa413b
                       ddd64473986f310f2a37c1fb6ce5b854d53f0e69
                       c99a1412a510b6c7ba6f50927164ea367d990cff
                       6171fc6a8795d0dc1f045eb30a32f9781d12e7bb
                       93980ef01c10a2d459ecb2795e743e7e1b9f2c80
                       fe0a8cdcb002ce4e952b891a293c01ae67f82c5f
                       38b83a5c559e372c21fb7cd60f301aa7f8ac0f83
                       0d9c6a72f26a6c6df396d14619fce77313a5199e
                       311b4cc07ff9bc099cced0ecb765871a26fdf3de
                       ff497f4734af8d7f7303c86b0e640778edff8f9c
                       b02b92d3039cb802cc17295b3b7516d1be354373
                       f15f2134c15595d35a19edbea73c698fbb6474ce
                       9eb9f52ef421f292079dbbcaa7b508cbdb04351c
                       8c735b73
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [78:ec:45:f6:9b:72:82:0d:09:69:f3:c2:5b:ad:73:1e:73:81:f2:49]
            modulus: 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
    public exponent: 10001

] 
2022-06-12 06:47:38.868  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-12 06:47:38.871 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-12 06:47:38.873 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-12 06:47:38.874 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-12 06:47:38.875  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-12 06:47:38.876  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-12 06:47:38.876  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-12 06:47:38.877 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-12 06:47:38.877 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-12 06:47:38.878 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-12 06:47:38.887 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-12 06:47:38.890 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-12 06:47:38.890 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-12 06:47:38.891 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-12 06:47:39.032  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-12 06:47:39.035  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-12 06:47:39.036 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-12 06:47:39.036 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-12 06:47:39.038  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-12 06:47:39.042  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-12 06:47:39.043 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 06:47:39.043 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 06:47:39.045 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 06:47:39.051 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 06:47:39.053 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 06:47:39.053 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 06:47:39.054 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 06:47:39.054 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 06:47:39.055 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 06:47:39.055 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-12 06:47:39.068 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 373415076224392227462997143177459335079962776374
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 12 05:12:18 UTC 2022
           Final Date: Fri Jun 11 05:12:17 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9a:06:ff:1d:17:ac:0f:b1:e0:6f:b2:01:1f:20:a2:db:ec:30:ed:9e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 756737166bc7d936a7aeaf13eb3d78cf0aa2e985
                       26b394e804548ef157f0ec04366536ec6209cb78
                       d2e523984aaa9c2a366a8229804bab0639822585
                       ad7fdfb781945c7b8ed3124c096e5e48f07aed42
                       0a968910234beac76d7db48905b1c1f5c55fb5dd
                       2f1155b6409eb7bda94e34bfb67cd7554d9c6cdc
                       207bf8b1bc08423f898f363ec583ca2a27fa413b
                       ddd64473986f310f2a37c1fb6ce5b854d53f0e69
                       c99a1412a510b6c7ba6f50927164ea367d990cff
                       6171fc6a8795d0dc1f045eb30a32f9781d12e7bb
                       93980ef01c10a2d459ecb2795e743e7e1b9f2c80
                       fe0a8cdcb002ce4e952b891a293c01ae67f82c5f
                       38b83a5c559e372c21fb7cd60f301aa7f8ac0f83
                       0d9c6a72f26a6c6df396d14619fce77313a5199e
                       311b4cc07ff9bc099cced0ecb765871a26fdf3de
                       ff497f4734af8d7f7303c86b0e640778edff8f9c
                       b02b92d3039cb802cc17295b3b7516d1be354373
                       f15f2134c15595d35a19edbea73c698fbb6474ce
                       9eb9f52ef421f292079dbbcaa7b508cbdb04351c
                       8c735b73
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e4:cb:24:70:e4:64:c5:a5:68:8c:6a:7f:f7:f9:da:fb:63:03:53:4c]
            modulus: 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
    public exponent: 10001

] 
2022-06-12 06:51:29.478  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-12 06:51:29.481 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-12 06:51:29.483 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-12 06:51:29.484 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-12 06:51:29.485  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-12 06:51:29.486  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-12 06:51:29.486  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-12 06:51:29.487 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-12 06:51:29.488 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-12 06:51:29.489 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-12 06:51:29.495 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-12 06:51:29.496 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-12 06:51:29.497 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-12 06:51:29.497 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-12 06:51:29.648  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-12 06:51:29.650  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-12 06:51:29.650 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-12 06:51:29.651 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-12 06:51:29.652  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-12 06:51:29.653  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-12 06:51:29.654 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 06:51:29.654 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 06:51:29.655 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 06:51:29.656 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 06:51:29.656 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 06:51:29.657 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 06:51:29.658 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 06:51:29.658 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 06:51:29.659 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 06:51:29.660 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-12 06:51:29.664 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 373415076224392227462997143177459335079962776374
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 12 05:12:18 UTC 2022
           Final Date: Fri Jun 11 05:12:17 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9a:06:ff:1d:17:ac:0f:b1:e0:6f:b2:01:1f:20:a2:db:ec:30:ed:9e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 756737166bc7d936a7aeaf13eb3d78cf0aa2e985
                       26b394e804548ef157f0ec04366536ec6209cb78
                       d2e523984aaa9c2a366a8229804bab0639822585
                       ad7fdfb781945c7b8ed3124c096e5e48f07aed42
                       0a968910234beac76d7db48905b1c1f5c55fb5dd
                       2f1155b6409eb7bda94e34bfb67cd7554d9c6cdc
                       207bf8b1bc08423f898f363ec583ca2a27fa413b
                       ddd64473986f310f2a37c1fb6ce5b854d53f0e69
                       c99a1412a510b6c7ba6f50927164ea367d990cff
                       6171fc6a8795d0dc1f045eb30a32f9781d12e7bb
                       93980ef01c10a2d459ecb2795e743e7e1b9f2c80
                       fe0a8cdcb002ce4e952b891a293c01ae67f82c5f
                       38b83a5c559e372c21fb7cd60f301aa7f8ac0f83
                       0d9c6a72f26a6c6df396d14619fce77313a5199e
                       311b4cc07ff9bc099cced0ecb765871a26fdf3de
                       ff497f4734af8d7f7303c86b0e640778edff8f9c
                       b02b92d3039cb802cc17295b3b7516d1be354373
                       f15f2134c15595d35a19edbea73c698fbb6474ce
                       9eb9f52ef421f292079dbbcaa7b508cbdb04351c
                       8c735b73
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f6:f9:1d:f9:18:34:1f:c9:dd:b5:f3:bb:b3:f1:d7:11:bc:b5:80:ad]
            modulus: cc4e5bc563dafd2c8a1b3d4fcf73acc78fed1ec666ec06e5fc4a429035417b5a6a69601b3878c7780b431d2c6fe2a8679243d38f9c8fe0d4c32abdf82c97676fa939da410919913b4cee2dd2ae80a5d1e839eefd9502d07a03bd1d436a5b5157ce2475bcc336c390a9622066c326351f52f57f26be9e2c214b29501bd84648cc7403995c1c674585b0051ed27da025366e2da310b33436aa7cd41f823b86912af0ff799bf8be30df9dc2dd5bbec5af0d23c79b3718aac4398d508d5f74530c4f933448127a56aa88c5cfec3e611e797d2303fe6832d9a7946bbb3dd56d217240a5c092ef84e5969d451d048695f1ac1a0dc2e956fee09d054edceb3a0671d1bd
    public exponent: 10001

] 
2022-06-12 06:53:28.025  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-12 06:53:28.028 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-12 06:53:28.031 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-12 06:53:28.032 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-12 06:53:28.033  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-12 06:53:28.034  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-12 06:53:28.034  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-12 06:53:28.035 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-12 06:53:28.035 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-12 06:53:28.036 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-12 06:53:28.043 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-12 06:53:28.045 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-12 06:53:28.045 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-12 06:53:28.046 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-12 06:53:28.211  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-12 06:53:28.212  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-12 06:53:28.213 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-12 06:53:28.213 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-12 06:53:28.215  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-12 06:53:28.215  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-12 06:53:28.215 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 06:53:28.216 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 06:53:28.216 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 06:53:28.217 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 06:53:28.217 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 06:53:28.218 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 06:53:28.218 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 06:53:28.219 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 06:53:28.219 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 06:53:28.220 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-12 06:53:28.224 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 373415076224392227462997143177459335079962776374
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 12 05:12:18 UTC 2022
           Final Date: Fri Jun 11 05:12:17 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9a:06:ff:1d:17:ac:0f:b1:e0:6f:b2:01:1f:20:a2:db:ec:30:ed:9e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 756737166bc7d936a7aeaf13eb3d78cf0aa2e985
                       26b394e804548ef157f0ec04366536ec6209cb78
                       d2e523984aaa9c2a366a8229804bab0639822585
                       ad7fdfb781945c7b8ed3124c096e5e48f07aed42
                       0a968910234beac76d7db48905b1c1f5c55fb5dd
                       2f1155b6409eb7bda94e34bfb67cd7554d9c6cdc
                       207bf8b1bc08423f898f363ec583ca2a27fa413b
                       ddd64473986f310f2a37c1fb6ce5b854d53f0e69
                       c99a1412a510b6c7ba6f50927164ea367d990cff
                       6171fc6a8795d0dc1f045eb30a32f9781d12e7bb
                       93980ef01c10a2d459ecb2795e743e7e1b9f2c80
                       fe0a8cdcb002ce4e952b891a293c01ae67f82c5f
                       38b83a5c559e372c21fb7cd60f301aa7f8ac0f83
                       0d9c6a72f26a6c6df396d14619fce77313a5199e
                       311b4cc07ff9bc099cced0ecb765871a26fdf3de
                       ff497f4734af8d7f7303c86b0e640778edff8f9c
                       b02b92d3039cb802cc17295b3b7516d1be354373
                       f15f2134c15595d35a19edbea73c698fbb6474ce
                       9eb9f52ef421f292079dbbcaa7b508cbdb04351c
                       8c735b73
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ba:7d:35:f5:55:c5:44:db:42:c1:4a:46:77:da:38:18:08:82:4a:9c]
            modulus: 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
    public exponent: 10001

] 
2022-06-12 06:56:13.820  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-12 06:56:13.822 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-12 06:56:13.824 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-12 06:56:13.825 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-12 06:56:13.825  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-12 06:56:13.826  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-12 06:56:13.827  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-12 06:56:13.827 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-12 06:56:13.827 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-12 06:56:13.828 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-12 06:56:13.836 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-12 06:56:13.837 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-12 06:56:13.837 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-12 06:56:13.838 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-12 06:56:13.983  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-12 06:56:13.984  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-12 06:56:13.984 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-12 06:56:13.985 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-12 06:56:13.986  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-12 06:56:13.986  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-12 06:56:13.987 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 06:56:13.987 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 06:56:13.988 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 06:56:13.989 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 06:56:13.989 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 06:56:13.989 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 06:56:13.990 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 06:56:13.991 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 06:56:13.991 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 06:56:13.992 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-12 06:56:13.996 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 373415076224392227462997143177459335079962776374
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 12 05:12:18 UTC 2022
           Final Date: Fri Jun 11 05:12:17 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9a:06:ff:1d:17:ac:0f:b1:e0:6f:b2:01:1f:20:a2:db:ec:30:ed:9e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 756737166bc7d936a7aeaf13eb3d78cf0aa2e985
                       26b394e804548ef157f0ec04366536ec6209cb78
                       d2e523984aaa9c2a366a8229804bab0639822585
                       ad7fdfb781945c7b8ed3124c096e5e48f07aed42
                       0a968910234beac76d7db48905b1c1f5c55fb5dd
                       2f1155b6409eb7bda94e34bfb67cd7554d9c6cdc
                       207bf8b1bc08423f898f363ec583ca2a27fa413b
                       ddd64473986f310f2a37c1fb6ce5b854d53f0e69
                       c99a1412a510b6c7ba6f50927164ea367d990cff
                       6171fc6a8795d0dc1f045eb30a32f9781d12e7bb
                       93980ef01c10a2d459ecb2795e743e7e1b9f2c80
                       fe0a8cdcb002ce4e952b891a293c01ae67f82c5f
                       38b83a5c559e372c21fb7cd60f301aa7f8ac0f83
                       0d9c6a72f26a6c6df396d14619fce77313a5199e
                       311b4cc07ff9bc099cced0ecb765871a26fdf3de
                       ff497f4734af8d7f7303c86b0e640778edff8f9c
                       b02b92d3039cb802cc17295b3b7516d1be354373
                       f15f2134c15595d35a19edbea73c698fbb6474ce
                       9eb9f52ef421f292079dbbcaa7b508cbdb04351c
                       8c735b73
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [01:9c:c9:52:d6:cc:73:ab:71:55:10:01:c4:e8:c6:d3:3f:aa:5f:b1]
            modulus: bf5dadb0f7cdee430d9ab13978be74846a3b0fabbf91c02e8cdd789d5fe0ce081700fcd462671eec767bf2931701e4c14df68de690bb4d6337fbaa20c4fae394ecdb530f72bdf588162660f2b6b67cb224fecc35222a1a4b5a53baaeb412447f8594bf451817014ada252d1551edb8c2744fa3836ff297a2c84aac2e5141d589a927555292a6d7171eb44dd2f66d839501c26ff32619e675c8aede00af7d1d33b8ac5c4423166a1b19622c9c169b6d1436e28e8aa476709bae5317747dd046de82841aae34fb1f02d22495e2aa9bef11e11c51fdb179011e7c55e59f4f31ae57770327b68cda81caa355c50248dbeca4dc75889ac56bcca01fb8876c99ade809
    public exponent: 10001

] 
2022-06-12 06:58:53.628  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-12 06:58:53.629 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-12 06:58:53.631 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-12 06:58:53.633 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-12 06:58:53.633  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-12 06:58:53.634  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-12 06:58:53.634  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-12 06:58:53.635 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-12 06:58:53.635 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-12 06:58:53.635 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-12 06:58:53.641 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-12 06:58:53.642 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-12 06:58:53.642 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-12 06:58:53.642 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-12 06:58:53.903  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-12 06:58:53.904  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-12 06:58:53.905 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-12 06:58:53.905 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-12 06:58:53.906  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-12 06:58:53.907  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-12 06:58:53.907 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 06:58:53.907 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 06:58:53.908 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 06:58:53.909 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 06:58:53.909 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 06:58:53.909 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 06:58:53.910 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 06:58:53.910 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 06:58:53.910 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 06:58:53.911 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-12 06:58:53.915 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 373415076224392227462997143177459335079962776374
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 12 05:12:18 UTC 2022
           Final Date: Fri Jun 11 05:12:17 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9a:06:ff:1d:17:ac:0f:b1:e0:6f:b2:01:1f:20:a2:db:ec:30:ed:9e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 756737166bc7d936a7aeaf13eb3d78cf0aa2e985
                       26b394e804548ef157f0ec04366536ec6209cb78
                       d2e523984aaa9c2a366a8229804bab0639822585
                       ad7fdfb781945c7b8ed3124c096e5e48f07aed42
                       0a968910234beac76d7db48905b1c1f5c55fb5dd
                       2f1155b6409eb7bda94e34bfb67cd7554d9c6cdc
                       207bf8b1bc08423f898f363ec583ca2a27fa413b
                       ddd64473986f310f2a37c1fb6ce5b854d53f0e69
                       c99a1412a510b6c7ba6f50927164ea367d990cff
                       6171fc6a8795d0dc1f045eb30a32f9781d12e7bb
                       93980ef01c10a2d459ecb2795e743e7e1b9f2c80
                       fe0a8cdcb002ce4e952b891a293c01ae67f82c5f
                       38b83a5c559e372c21fb7cd60f301aa7f8ac0f83
                       0d9c6a72f26a6c6df396d14619fce77313a5199e
                       311b4cc07ff9bc099cced0ecb765871a26fdf3de
                       ff497f4734af8d7f7303c86b0e640778edff8f9c
                       b02b92d3039cb802cc17295b3b7516d1be354373
                       f15f2134c15595d35a19edbea73c698fbb6474ce
                       9eb9f52ef421f292079dbbcaa7b508cbdb04351c
                       8c735b73
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [45:2a:5c:35:17:90:34:68:fe:82:66:10:8f:55:dd:4d:4e:40:e2:28]
            modulus: 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
    public exponent: 10001

] 
2022-06-12 07:00:36.796  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-12 07:00:36.798 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-12 07:00:36.800 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-12 07:00:36.801 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-12 07:00:36.802  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-12 07:00:36.802  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-12 07:00:36.803  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-12 07:00:36.803 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-12 07:00:36.804 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-12 07:00:36.805 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-12 07:00:36.811 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-12 07:00:36.812 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-12 07:00:36.813 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-12 07:00:36.813 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-12 07:00:36.946  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-12 07:00:36.947  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-12 07:00:36.947 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-12 07:00:36.948 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-12 07:00:36.949  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-12 07:00:36.949  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-12 07:00:36.950 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 07:00:36.950 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 07:00:36.951 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 07:00:36.952 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 07:00:36.952 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 07:00:36.952 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 07:00:36.953 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 07:00:36.954 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 07:00:36.954 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 07:00:36.955 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-12 07:00:36.962 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 373415076224392227462997143177459335079962776374
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 12 05:12:18 UTC 2022
           Final Date: Fri Jun 11 05:12:17 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9a:06:ff:1d:17:ac:0f:b1:e0:6f:b2:01:1f:20:a2:db:ec:30:ed:9e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 756737166bc7d936a7aeaf13eb3d78cf0aa2e985
                       26b394e804548ef157f0ec04366536ec6209cb78
                       d2e523984aaa9c2a366a8229804bab0639822585
                       ad7fdfb781945c7b8ed3124c096e5e48f07aed42
                       0a968910234beac76d7db48905b1c1f5c55fb5dd
                       2f1155b6409eb7bda94e34bfb67cd7554d9c6cdc
                       207bf8b1bc08423f898f363ec583ca2a27fa413b
                       ddd64473986f310f2a37c1fb6ce5b854d53f0e69
                       c99a1412a510b6c7ba6f50927164ea367d990cff
                       6171fc6a8795d0dc1f045eb30a32f9781d12e7bb
                       93980ef01c10a2d459ecb2795e743e7e1b9f2c80
                       fe0a8cdcb002ce4e952b891a293c01ae67f82c5f
                       38b83a5c559e372c21fb7cd60f301aa7f8ac0f83
                       0d9c6a72f26a6c6df396d14619fce77313a5199e
                       311b4cc07ff9bc099cced0ecb765871a26fdf3de
                       ff497f4734af8d7f7303c86b0e640778edff8f9c
                       b02b92d3039cb802cc17295b3b7516d1be354373
                       f15f2134c15595d35a19edbea73c698fbb6474ce
                       9eb9f52ef421f292079dbbcaa7b508cbdb04351c
                       8c735b73
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d7:e8:ad:d0:66:99:73:d5:9d:1c:57:fd:05:47:9f:9e:4c:df:cc:d1]
            modulus: a0f44272a16405ed9b10a637b7ed3df4eacffb1ed188ad1d9bb2ba8a6053b824428dd85b271539f34e56defdbb2c9ca9b46b2b26ffa7782587ac3396593be233e949dc56c02dd7089723f5f65744b6bb778f69f72f2c1fb5d4c71170b8d5d4165fed0ba08f2039dc98afc99af6f25b3198cb9fb4e925c3792e4d4c1c12e0610d0892efb61bcc8fc6e3a20ad6b5c157258f22ee35704f9a65735018af68c314cb2b725747f534a553ef7c558ad6269a541609b5555ece1af6b496074bafbe36967297c4c3e592c8b495df74e9b5cb4851cd719eace092042686ca6b5677886fee287e8805c23043a2fb241a026cd08c387f53101f939cb2b9b6c95803019f6839
    public exponent: 10001

] 
2022-06-12 07:05:05.521  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-12 07:05:05.523 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-12 07:05:05.544 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-12 07:05:05.545 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-12 07:05:05.545  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-12 07:05:05.546  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-12 07:05:05.546  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-12 07:05:05.547 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-12 07:05:05.547 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-12 07:05:05.547 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-12 07:05:05.555 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-12 07:05:05.556 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-12 07:05:05.556 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-12 07:05:05.557 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-12 07:05:05.695  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-12 07:05:05.695  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-12 07:05:05.696 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-12 07:05:05.696 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-12 07:05:05.697  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-12 07:05:05.698  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-12 07:05:05.698 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 07:05:05.698 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 07:05:05.698 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 07:05:05.699 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 07:05:05.699 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 07:05:05.700 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 07:05:05.701 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 07:05:05.701 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 07:05:05.701 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 07:05:05.702 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-12 07:05:05.708 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 373415076224392227462997143177459335079962776374
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 12 05:12:18 UTC 2022
           Final Date: Fri Jun 11 05:12:17 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9a:06:ff:1d:17:ac:0f:b1:e0:6f:b2:01:1f:20:a2:db:ec:30:ed:9e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 756737166bc7d936a7aeaf13eb3d78cf0aa2e985
                       26b394e804548ef157f0ec04366536ec6209cb78
                       d2e523984aaa9c2a366a8229804bab0639822585
                       ad7fdfb781945c7b8ed3124c096e5e48f07aed42
                       0a968910234beac76d7db48905b1c1f5c55fb5dd
                       2f1155b6409eb7bda94e34bfb67cd7554d9c6cdc
                       207bf8b1bc08423f898f363ec583ca2a27fa413b
                       ddd64473986f310f2a37c1fb6ce5b854d53f0e69
                       c99a1412a510b6c7ba6f50927164ea367d990cff
                       6171fc6a8795d0dc1f045eb30a32f9781d12e7bb
                       93980ef01c10a2d459ecb2795e743e7e1b9f2c80
                       fe0a8cdcb002ce4e952b891a293c01ae67f82c5f
                       38b83a5c559e372c21fb7cd60f301aa7f8ac0f83
                       0d9c6a72f26a6c6df396d14619fce77313a5199e
                       311b4cc07ff9bc099cced0ecb765871a26fdf3de
                       ff497f4734af8d7f7303c86b0e640778edff8f9c
                       b02b92d3039cb802cc17295b3b7516d1be354373
                       f15f2134c15595d35a19edbea73c698fbb6474ce
                       9eb9f52ef421f292079dbbcaa7b508cbdb04351c
                       8c735b73
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [43:ab:5f:94:4c:78:16:01:2d:fb:bf:9d:28:d9:5a:8a:5f:8c:72:de]
            modulus: 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
    public exponent: 10001

] 
2022-06-12 07:06:16.748  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-12 07:06:16.750 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-12 07:06:16.752 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-12 07:06:16.753 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-12 07:06:16.754  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-12 07:06:16.755  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-12 07:06:16.755  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-12 07:06:16.756 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-12 07:06:16.756 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-12 07:06:16.757 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-12 07:06:16.765 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-12 07:06:16.766 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-12 07:06:16.766 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-12 07:06:16.767 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-12 07:06:16.894  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-12 07:06:16.895  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-12 07:06:16.895 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-12 07:06:16.896 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-12 07:06:16.897  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-12 07:06:16.897  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-12 07:06:16.898 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 07:06:16.898 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 07:06:16.899 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 07:06:16.899 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 07:06:16.899 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 07:06:16.899 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 07:06:16.900 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 07:06:16.900 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 07:06:16.901 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 07:06:16.901 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-12 07:06:16.904 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 373415076224392227462997143177459335079962776374
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 12 05:12:18 UTC 2022
           Final Date: Fri Jun 11 05:12:17 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9a:06:ff:1d:17:ac:0f:b1:e0:6f:b2:01:1f:20:a2:db:ec:30:ed:9e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 756737166bc7d936a7aeaf13eb3d78cf0aa2e985
                       26b394e804548ef157f0ec04366536ec6209cb78
                       d2e523984aaa9c2a366a8229804bab0639822585
                       ad7fdfb781945c7b8ed3124c096e5e48f07aed42
                       0a968910234beac76d7db48905b1c1f5c55fb5dd
                       2f1155b6409eb7bda94e34bfb67cd7554d9c6cdc
                       207bf8b1bc08423f898f363ec583ca2a27fa413b
                       ddd64473986f310f2a37c1fb6ce5b854d53f0e69
                       c99a1412a510b6c7ba6f50927164ea367d990cff
                       6171fc6a8795d0dc1f045eb30a32f9781d12e7bb
                       93980ef01c10a2d459ecb2795e743e7e1b9f2c80
                       fe0a8cdcb002ce4e952b891a293c01ae67f82c5f
                       38b83a5c559e372c21fb7cd60f301aa7f8ac0f83
                       0d9c6a72f26a6c6df396d14619fce77313a5199e
                       311b4cc07ff9bc099cced0ecb765871a26fdf3de
                       ff497f4734af8d7f7303c86b0e640778edff8f9c
                       b02b92d3039cb802cc17295b3b7516d1be354373
                       f15f2134c15595d35a19edbea73c698fbb6474ce
                       9eb9f52ef421f292079dbbcaa7b508cbdb04351c
                       8c735b73
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5a:5f:cf:e2:39:3b:ba:8a:13:d4:fe:52:00:d7:ab:92:66:cc:24:67]
            modulus: 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
    public exponent: 10001

] 
2022-06-12 07:06:36.604  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-12 07:06:36.605 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-12 07:06:36.606 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-12 07:06:36.607 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-12 07:06:36.608  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-12 07:06:36.609  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-12 07:06:36.609  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-12 07:06:36.610 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-12 07:06:36.610 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-12 07:06:36.611 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-12 07:06:36.617 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-12 07:06:36.619 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-12 07:06:36.619 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-12 07:06:36.620 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-12 07:06:36.711  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-12 07:06:36.712  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-12 07:06:36.713 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-12 07:06:36.713 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-12 07:06:36.715  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-12 07:06:36.715  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-12 07:06:36.715 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 07:06:36.716 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 07:06:36.716 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 07:06:36.717 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 07:06:36.717 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 07:06:36.717 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 07:06:36.718 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 07:06:36.718 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 07:06:36.719 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 07:06:36.719 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-12 07:06:36.723 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 373415076224392227462997143177459335079962776374
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 12 05:12:18 UTC 2022
           Final Date: Fri Jun 11 05:12:17 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9a:06:ff:1d:17:ac:0f:b1:e0:6f:b2:01:1f:20:a2:db:ec:30:ed:9e]
            modulus: 89787f3a655267a2f2b796bf7fdb13cbe8cfbc8eb49add404a9376230fe0a531f5671a8c5e7d2cfcd70ac0b21ed94cca5c003a3e925e7800662a7eddd0fefbd84ba1956c37d4d99862ec8c543ef2fd2a80556870883319a0646ca127f858a7e698dd52d893c5b458011c936011c752359f937eb2282f98f31539e3875e4eb6fa5741fda553a3f387594f4283c4803890930c9a14722313b4e6b7621f0a1c07651e06b22d8c7aa753ca268b3450c2b172e67e68bbec33fa7498a8e06c16c250599414ddf65c24e71d35cfc54d0d9c332ea47d4d79ba230cb28bf99eb9336f8bf6068c58eb64865286076b6a0ceccdaef0f6a4e07ef93a552d6abef7570e067f6861eb96a865484aaa33f9bc8d5119aadb264348685483bfc09f338c3dee64da6ef176e4b2d281acd1ad1ee6747d09750bf4ff2ba9a7a0d3d3967af9e572e08bc6bdd1c5b501651abae81767222e260883d5f8a7eb0b31a2d1c51ce525d1b2ce221e714cf2b44b5f6964a256b798816569464dc16884f8c489e876f108cbb0c0cf
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 756737166bc7d936a7aeaf13eb3d78cf0aa2e985
                       26b394e804548ef157f0ec04366536ec6209cb78
                       d2e523984aaa9c2a366a8229804bab0639822585
                       ad7fdfb781945c7b8ed3124c096e5e48f07aed42
                       0a968910234beac76d7db48905b1c1f5c55fb5dd
                       2f1155b6409eb7bda94e34bfb67cd7554d9c6cdc
                       207bf8b1bc08423f898f363ec583ca2a27fa413b
                       ddd64473986f310f2a37c1fb6ce5b854d53f0e69
                       c99a1412a510b6c7ba6f50927164ea367d990cff
                       6171fc6a8795d0dc1f045eb30a32f9781d12e7bb
                       93980ef01c10a2d459ecb2795e743e7e1b9f2c80
                       fe0a8cdcb002ce4e952b891a293c01ae67f82c5f
                       38b83a5c559e372c21fb7cd60f301aa7f8ac0f83
                       0d9c6a72f26a6c6df396d14619fce77313a5199e
                       311b4cc07ff9bc099cced0ecb765871a26fdf3de
                       ff497f4734af8d7f7303c86b0e640778edff8f9c
                       b02b92d3039cb802cc17295b3b7516d1be354373
                       f15f2134c15595d35a19edbea73c698fbb6474ce
                       9eb9f52ef421f292079dbbcaa7b508cbdb04351c
                       8c735b73
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2d:ba:fd:c0:b4:38:1a:5b:8a:a1:16:4d:3a:30:5f:cc:f9:7f:3b:b3]
            modulus: b687f92863fc356c244350ff826f0f55e68ab7c0364922af830970a86d50fa12aeff16622371dad7a200149e3a29f84ab685ca7e760800c2e54efa67fb20a8414c1c537fe23260a7d31b9473a3791b4baee6c99d4ff68cbe020f7b976cf71d6ccc1d935e50090299a25c1ed3f4f710772cae7df3d17822eeaad006b9d709c7e6970f16bbf9a997665d7c3a5a9b51593e3aed4958c5f920242f706a7b76575b249d865a01962daf32be07ef2ed22526c337843db5ef3e1e0b5353fe8cda524220f9b94928276a39565e86ad75ce08cd3c757bd475f3eed8b54add4c672aab14be3826e29ec87f3a7cecc3051e24376a3950a074038cba021deabbdbb28b53790b
    public exponent: 10001

] 
2022-06-12 07:10:48.110  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-12 07:10:48.112 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-12 07:10:48.117 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-12 07:10:48.118 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-12 07:10:48.119  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-12 07:10:48.120  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-12 07:10:48.120  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-12 07:10:48.121 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-12 07:10:48.122 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-12 07:10:48.123 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-12 07:10:48.130 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-12 07:10:48.131 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-12 07:10:48.132 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-12 07:10:48.132 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-12 07:10:48.263  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-12 07:10:48.264  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-12 07:10:48.264 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-12 07:10:48.264 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-12 07:10:48.266  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-12 07:10:48.266  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-12 07:10:48.266 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 07:10:48.267 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 07:10:48.267 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 07:10:48.268 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 07:10:48.268 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 07:10:48.268 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 07:10:48.269 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 07:10:48.269 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 07:10:48.270 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 07:10:48.270 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-12 07:10:48.275 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 373415076224392227462997143177459335079962776374
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 12 05:12:18 UTC 2022
           Final Date: Fri Jun 11 05:12:17 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9a:06:ff:1d:17:ac:0f:b1:e0:6f:b2:01:1f:20:a2:db:ec:30:ed:9e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 756737166bc7d936a7aeaf13eb3d78cf0aa2e985
                       26b394e804548ef157f0ec04366536ec6209cb78
                       d2e523984aaa9c2a366a8229804bab0639822585
                       ad7fdfb781945c7b8ed3124c096e5e48f07aed42
                       0a968910234beac76d7db48905b1c1f5c55fb5dd
                       2f1155b6409eb7bda94e34bfb67cd7554d9c6cdc
                       207bf8b1bc08423f898f363ec583ca2a27fa413b
                       ddd64473986f310f2a37c1fb6ce5b854d53f0e69
                       c99a1412a510b6c7ba6f50927164ea367d990cff
                       6171fc6a8795d0dc1f045eb30a32f9781d12e7bb
                       93980ef01c10a2d459ecb2795e743e7e1b9f2c80
                       fe0a8cdcb002ce4e952b891a293c01ae67f82c5f
                       38b83a5c559e372c21fb7cd60f301aa7f8ac0f83
                       0d9c6a72f26a6c6df396d14619fce77313a5199e
                       311b4cc07ff9bc099cced0ecb765871a26fdf3de
                       ff497f4734af8d7f7303c86b0e640778edff8f9c
                       b02b92d3039cb802cc17295b3b7516d1be354373
                       f15f2134c15595d35a19edbea73c698fbb6474ce
                       9eb9f52ef421f292079dbbcaa7b508cbdb04351c
                       8c735b73
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [47:69:6f:72:01:f9:bb:3c:c9:23:cd:79:f5:7e:3a:1c:b6:d2:1d:2d]
            modulus: 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
    public exponent: 10001

] 
2022-06-12 07:15:01.145  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-12 07:15:01.147 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-12 07:15:01.149 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-12 07:15:01.149 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-12 07:15:01.150  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-12 07:15:01.151  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-12 07:15:01.151  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-12 07:15:01.151 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-12 07:15:01.152 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-12 07:15:01.153 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-12 07:15:01.160 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-12 07:15:01.161 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-12 07:15:01.161 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-12 07:15:01.161 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-12 07:15:01.328  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-12 07:15:01.329  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-12 07:15:01.329 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-12 07:15:01.330 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-12 07:15:01.332  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-12 07:15:01.332  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-12 07:15:01.333 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 07:15:01.333 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 07:15:01.334 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 07:15:01.335 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 07:15:01.335 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 07:15:01.335 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 07:15:01.336 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 07:15:01.337 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 07:15:01.337 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 07:15:01.338 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-12 07:15:01.344 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 373415076224392227462997143177459335079962776374
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 12 05:12:18 UTC 2022
           Final Date: Fri Jun 11 05:12:17 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9a:06:ff:1d:17:ac:0f:b1:e0:6f:b2:01:1f:20:a2:db:ec:30:ed:9e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 756737166bc7d936a7aeaf13eb3d78cf0aa2e985
                       26b394e804548ef157f0ec04366536ec6209cb78
                       d2e523984aaa9c2a366a8229804bab0639822585
                       ad7fdfb781945c7b8ed3124c096e5e48f07aed42
                       0a968910234beac76d7db48905b1c1f5c55fb5dd
                       2f1155b6409eb7bda94e34bfb67cd7554d9c6cdc
                       207bf8b1bc08423f898f363ec583ca2a27fa413b
                       ddd64473986f310f2a37c1fb6ce5b854d53f0e69
                       c99a1412a510b6c7ba6f50927164ea367d990cff
                       6171fc6a8795d0dc1f045eb30a32f9781d12e7bb
                       93980ef01c10a2d459ecb2795e743e7e1b9f2c80
                       fe0a8cdcb002ce4e952b891a293c01ae67f82c5f
                       38b83a5c559e372c21fb7cd60f301aa7f8ac0f83
                       0d9c6a72f26a6c6df396d14619fce77313a5199e
                       311b4cc07ff9bc099cced0ecb765871a26fdf3de
                       ff497f4734af8d7f7303c86b0e640778edff8f9c
                       b02b92d3039cb802cc17295b3b7516d1be354373
                       f15f2134c15595d35a19edbea73c698fbb6474ce
                       9eb9f52ef421f292079dbbcaa7b508cbdb04351c
                       8c735b73
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ca:97:25:83:a1:b7:d2:7d:cb:da:da:de:59:60:41:94:20:40:5f:80]
            modulus: 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
    public exponent: 10001

] 
2022-06-12 07:24:09.471  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-12 07:24:09.473 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-12 07:24:09.474 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-12 07:24:09.475 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-12 07:24:09.475  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-12 07:24:09.476  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-12 07:24:09.476  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-12 07:24:09.477 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-12 07:24:09.477 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-12 07:24:09.477 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-12 07:24:09.484 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-12 07:24:09.485 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-12 07:24:09.485 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-12 07:24:09.486 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-12 07:24:09.614  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-12 07:24:09.615  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-12 07:24:09.615 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-12 07:24:09.615 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-12 07:24:09.617  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-12 07:24:09.617  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-12 07:24:09.618 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 07:24:09.618 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 07:24:09.618 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 07:24:09.619 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 07:24:09.619 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 07:24:09.619 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 07:24:09.620 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 07:24:09.620 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 07:24:09.620 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 07:24:09.621 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-12 07:24:09.625 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 373415076224392227462997143177459335079962776374
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 12 05:12:18 UTC 2022
           Final Date: Fri Jun 11 05:12:17 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9a:06:ff:1d:17:ac:0f:b1:e0:6f:b2:01:1f:20:a2:db:ec:30:ed:9e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 756737166bc7d936a7aeaf13eb3d78cf0aa2e985
                       26b394e804548ef157f0ec04366536ec6209cb78
                       d2e523984aaa9c2a366a8229804bab0639822585
                       ad7fdfb781945c7b8ed3124c096e5e48f07aed42
                       0a968910234beac76d7db48905b1c1f5c55fb5dd
                       2f1155b6409eb7bda94e34bfb67cd7554d9c6cdc
                       207bf8b1bc08423f898f363ec583ca2a27fa413b
                       ddd64473986f310f2a37c1fb6ce5b854d53f0e69
                       c99a1412a510b6c7ba6f50927164ea367d990cff
                       6171fc6a8795d0dc1f045eb30a32f9781d12e7bb
                       93980ef01c10a2d459ecb2795e743e7e1b9f2c80
                       fe0a8cdcb002ce4e952b891a293c01ae67f82c5f
                       38b83a5c559e372c21fb7cd60f301aa7f8ac0f83
                       0d9c6a72f26a6c6df396d14619fce77313a5199e
                       311b4cc07ff9bc099cced0ecb765871a26fdf3de
                       ff497f4734af8d7f7303c86b0e640778edff8f9c
                       b02b92d3039cb802cc17295b3b7516d1be354373
                       f15f2134c15595d35a19edbea73c698fbb6474ce
                       9eb9f52ef421f292079dbbcaa7b508cbdb04351c
                       8c735b73
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c8:6a:95:aa:87:1e:64:9a:5e:7d:0b:7d:36:65:fd:42:8b:91:af:be]
            modulus: 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
    public exponent: 10001

] 
2022-06-12 07:28:22.724  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-12 07:28:22.726 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-12 07:28:22.729 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-12 07:28:22.730 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-12 07:28:22.730  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-12 07:28:22.731  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-12 07:28:22.731  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-12 07:28:22.732 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-12 07:28:22.732 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-12 07:28:22.733 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-12 07:28:22.739 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-12 07:28:22.740 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-12 07:28:22.741 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-12 07:28:22.742 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-12 07:28:22.958  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-12 07:28:22.959  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-12 07:28:22.960 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-12 07:28:22.960 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-12 07:28:22.962  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-12 07:28:22.962  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-12 07:28:22.962 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 07:28:22.962 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 07:28:22.963 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 07:28:22.963 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 07:28:22.963 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 07:28:22.964 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 07:28:22.965 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-12 07:28:22.965 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-12 07:28:22.965 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-12 07:28:22.966 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-12 07:28:22.970 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 373415076224392227462997143177459335079962776374
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 12 05:12:18 UTC 2022
           Final Date: Fri Jun 11 05:12:17 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9a:06:ff:1d:17:ac:0f:b1:e0:6f:b2:01:1f:20:a2:db:ec:30:ed:9e]
            modulus: 89787f3a655267a2f2b796bf7fdb13cbe8cfbc8eb49add404a9376230fe0a531f5671a8c5e7d2cfcd70ac0b21ed94cca5c003a3e925e7800662a7eddd0fefbd84ba1956c37d4d99862ec8c543ef2fd2a80556870883319a0646ca127f858a7e698dd52d893c5b458011c936011c752359f937eb2282f98f31539e3875e4eb6fa5741fda553a3f387594f4283c4803890930c9a14722313b4e6b7621f0a1c07651e06b22d8c7aa753ca268b3450c2b172e67e68bbec33fa7498a8e06c16c250599414ddf65c24e71d35cfc54d0d9c332ea47d4d79ba230cb28bf99eb9336f8bf6068c58eb64865286076b6a0ceccdaef0f6a4e07ef93a552d6abef7570e067f6861eb96a865484aaa33f9bc8d5119aadb264348685483bfc09f338c3dee64da6ef176e4b2d281acd1ad1ee6747d09750bf4ff2ba9a7a0d3d3967af9e572e08bc6bdd1c5b501651abae81767222e260883d5f8a7eb0b31a2d1c51ce525d1b2ce221e714cf2b44b5f6964a256b798816569464dc16884f8c489e876f108cbb0c0cf
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 756737166bc7d936a7aeaf13eb3d78cf0aa2e985
                       26b394e804548ef157f0ec04366536ec6209cb78
                       d2e523984aaa9c2a366a8229804bab0639822585
                       ad7fdfb781945c7b8ed3124c096e5e48f07aed42
                       0a968910234beac76d7db48905b1c1f5c55fb5dd
                       2f1155b6409eb7bda94e34bfb67cd7554d9c6cdc
                       207bf8b1bc08423f898f363ec583ca2a27fa413b
                       ddd64473986f310f2a37c1fb6ce5b854d53f0e69
                       c99a1412a510b6c7ba6f50927164ea367d990cff
                       6171fc6a8795d0dc1f045eb30a32f9781d12e7bb
                       93980ef01c10a2d459ecb2795e743e7e1b9f2c80
                       fe0a8cdcb002ce4e952b891a293c01ae67f82c5f
                       38b83a5c559e372c21fb7cd60f301aa7f8ac0f83
                       0d9c6a72f26a6c6df396d14619fce77313a5199e
                       311b4cc07ff9bc099cced0ecb765871a26fdf3de
                       ff497f4734af8d7f7303c86b0e640778edff8f9c
                       b02b92d3039cb802cc17295b3b7516d1be354373
                       f15f2134c15595d35a19edbea73c698fbb6474ce
                       9eb9f52ef421f292079dbbcaa7b508cbdb04351c
                       8c735b73
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3e:a3:0c:43:c8:bf:3b:7c:d9:b1:a7:06:94:9c:8a:90:52:39:79:ee]
            modulus: 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
    public exponent: 10001

]